News

Resources

Bitdefender won AV-Comparatives' Product of the Year award after winning Advanced+ rating in tests throughout 2017 covering the categories of Real World Protection, Performance, Malware Protection, False Alarms and Malware... Read More

Bitdefender, a leading global cybersecurity technology company protecting 500 million users worldwide, has appointed Andrew Philpott as Vice President of Enterprise Sales, Europe, the Middle East, and Africa (EMEA). Philpott’s... Read More

Bitdefender, a leading global cybersecurity technology company protecting 500 million users worldwide, has appointed Joe Sykora, a 21-year-veteran of the security industry, as Vice President of Worldwide Channel Development, continuing... Read More

Bitdefender, a leading cybersecurity technology company protecting 500 million users worldwide and NETGEAR, Inc. (NASDAQ:NTGR), a global networking company that delivers innovative products to consumers, businesses and service providers, announced... Read More

Detect Exploits and Zero Day Attacks

By their very nature, AV signatures cannot stop unknown threats. New and established security vendors claim their ‘next-generation’ solutions use signature-less detection based on revolutionary technologies like machine learning to catch zero-days. Despite the alluring stories and buzzwords, the efficiency of these solutions is anecdotal and rarely backed by trustworthy independent sources.

Unlike alternative solutions, Bitdefender consistently proves the efficiency of its signature-less technologies in the most important independent tests, blocking 99% of zero-day threats in the AV-Comparatives heuristic/behavioral trials. Besides achieving the best detection rates against zero-day threats, Bitdefender also routinely scores the lowest number of false positives.

Business Security

Bitdefender’s new anti-exploit protection is designed to tackle evasive exploits, to help reduce the APT attack surface and minimize the risk of being targeted. The technology works by zooming in on potentially vulnerable software and running a structural analysis during key execution points. If an anomaly is detected, admins can choose to automatically block the execution or to simply be notified. With this additional feature, advanced attacks are stopped before the payload actually reaches the infrastructure, thus greatly increasing the costs of attacks for targeted threat actors.